US20130132395A1 - Mobile social groups - Google Patents
Mobile social groups Download PDFInfo
- Publication number
- US20130132395A1 US20130132395A1 US13/303,639 US201113303639A US2013132395A1 US 20130132395 A1 US20130132395 A1 US 20130132395A1 US 201113303639 A US201113303639 A US 201113303639A US 2013132395 A1 US2013132395 A1 US 2013132395A1
- Authority
- US
- United States
- Prior art keywords
- social
- call
- user
- text
- pairs
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims description 19
- 230000010365 information processing Effects 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 2
- 238000004891 communication Methods 0.000 description 12
- 230000008901 benefit Effects 0.000 description 5
- 230000006855 networking Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000002123 temporal effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 230000010154 cross-pollination Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000014616 translation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
Definitions
- the invention disclosed broadly relates to the field of social networks, and more particularly relates to the field of social connections through mobile devices.
- a method for expanding a user's social connections to include mobile contacts includes steps or acts of: receiving a user's call logs for call/text transactions from a mobile device; deriving usage information from the call logs to determine social pairs; ranking the social pairs based on strength of connectedness; and merging the ranked social pairs with the user's contacts from on-line social networks.
- a computer readable storage medium includes program instructions for performing the method steps above.
- an information processing system includes memory with program instructions stored therein, the program instructions causing a computer to perform: receiving a user's call logs for call/text transactions from a mobile device; deriving usage information from the call logs to determine social pairs; ranking the social pairs based on strength of connectedness; and merging the ranked social pairs with the user's contacts from on-line social networks.
- the system further includes a processor device operably coupled with the memory for executing the program instructions.
- FIG. 1 is a simplified illustration of the social mobile network platform, according to an embodiment of the present invention.
- FIG. 2 is a flowchart of a method according to an embodiment of the invention.
- FIG. 3 is a simplified block diagram of a computing system configured to operate according to an embodiment of the present invention
- FIG. 4 shows a simplified representation of a call/text log for a user for one day
- FIG. 5 shows a simplified representation of a log with matched number/name pairs, according to an embodiment of the present invention
- FIG. 6 shows a flowchart of a subprocess from the flowchart of FIG. 2 , according to an embodiment of the present invention
- FIG. 7 shows a flowchart of the merge subprocess, according to an embodiment of the present invention.
- FIG. 8 shows how the social graph, according to an embodiment of the present invention.
- the social mobile network platform 150 collects usage information for the data and voice calls received and initiated by the user via the user's mobile device 105 . This information is available from the service provider 110 as a call log 120 . The service provider 110 maintains the logs 120 of all incoming and outgoing call/text transactions and this information is used by the platform 150 to derive a mobile social network 160 .
- the mobile social network 160 assigns a status ranking ranging from most-connected to least-connected social pairs based on: a) the number of transactions; and b) the duration of each transaction.
- a social pair as the “user+x,” with x being either the initiator or the receiver of each call/text.
- x being either the initiator or the receiver of each call/text.
- the originally derived connections become stronger compared to others.
- some social pairs will lose their connected status over a period of time as less contact is made between them.
- step 210 by requesting the user's call logs 120 for the user's call/text transactions.
- the telephone network service provider 110 maintains the logs 120 of all of the user's call/text transactions.
- step 220 we collect the usage information over time in order to derive the social pairs to produce a social graph. Note that we do not consider every call/text transaction from the call logs for inclusion as a social pair. We need to eliminate those transactions that do not meet a pre-determined social threshold. We eliminate: a) calls/text to/from a business/government; b) calls/text that only occur once; and c) calls of a very short duration (probable wrong number).
- step 230 we rank the social pairs by the strength of their “connectedness” in step 230 .
- step 240 we aggregate the social pairs into groups by category.
- parameters such as voice only, data only (SMS, MMS, etc) or mixed (voice and data).
- temporal parameters such as time of day (morning, evening); and specific day as for recurring conference calls.
- FIG. 5 shows a log with matched social pairs. The strength of connections will be determined with the parameters including number of transactions, frequency of the transactions, initiated transactions versus received transactions, duration of transactions, and recency of transactions.
- step 250 we merge the new social connections from the mobile social network 160 with the user's existing social network accounts 180 .
- By uncovering these new social connections 160 based on mobile usage and integrating them with the user's profile and with other social networks 180 we are able to enrich the user's Internet-based social networks 180 .
- FIG. 7 shows the sub-process steps for step 250 .
- step 760 we add x to the user's social profile. In this way, when a user logs in to his/her social network 180 over the Internet, the user's mobile social connections 160 will be included.
- step 610 we show the sub-process steps for step 210 of FIG. 2 .
- the users In order to acquire access to the call logs 120 , the users must first opt in for the mobile social groups service and provide a release.
- step 620 we verify that the user has provided permission to contact his/her service provider 110 . Since agreements of this nature tend to have temporal limits, we must monitor expiration dates and renew accordingly.
- our platform 150 will work directly with the user's service provider 110 to obtain the user translations (call logs 120 ) in step 630 .
- step 640 we store the call logs 120 . Now we have call logs 120 which provide telephone numbers, but no names. See FIG. 4 for an exemplary representation of a call log 120 for a user representing calls/texts made/received in one day.
- step 650 we match the phone numbers from the call logs 120 to the contact names from the user's mobile device 105 in step 660 .
- step 660 We add the names and details to the social graph we maintain in our platform 150 .
- FIG. 8 shows an exemplary social graph 800 .
- calls/texts pertaining to businesses/government and calls/texts of a very short duration have been eliminated.
- we determined the “most-connected”social pairs, and here the top four are shown.
- From this grouping of “most-connected” we implemented the sub-process shown in FIG. 6 to derive the contact names (shown grayed out) from the user's mobile device 105 .
- the contact names we implemented the sub-process of FIG. 7 to merge these “most-connected” social pairings with the user's social networking contacts from social networking sites 180 .
- Susan E., S. Jobs, and M. Hamilton are already “friends” on the site 180 , so we send a connection request to Gus Hailey only.
- FIG. 3 System Embodiment.
- FIG. 3 there is provided a simplified pictorial illustration of an information processing system 300 for the social mobile network platform 150 in which the present invention may be implemented.
- computer system 300 may represent any type of computer, information processing system or other programmable electronic device, including a client computer, a server computer, a portable computer, an embedded controller, a personal digital assistant, and so on.
- the computer system 300 may be a stand-alone device or networked into a larger system.
- Computer system 300 illustrated for exemplary purposes as a networked computing device, is in communication with other networked computing devices (not shown) via network 310 .
- network 310 may be embodied using conventional networking technologies and may include one or more of the following: local area networks, wide area networks, intranets, public Internet and the like.
- Computer system 300 includes inter alia processing device 302 which communicates with an input/output subsystem 306 , memory 304 , storage 310 and network 310 .
- the processor device 302 is operably coupled with a communication infrastructure 322 (e.g., a communications bus, cross-over bar, or network).
- the processor device 302 may be a general or special purpose microprocessor operating under control of computer program instructions executed from memory 304 on program data 334 .
- the program data 334 includes the objects and their metadata. Program instructions for generating the mobile social pairs and merging them with social networks may be stored in 332 .
- the processor 302 may include a number of special purpose sub-processors such as a comparator engine, each sub-processor for executing particular portions of the computer program instructions. Each sub-processor may be a separate circuit able to operate substantially in parallel with the other sub-processors.
- sub-processors may be implemented as computer program processes (software) tangibly stored in a memory that perform their respective functions when executed. These may share an instruction processor, such as a general purpose integrated circuit microprocessor, or each sub-processor may have its own processor for executing instructions. Alternatively, some or all of the sub-processors may be implemented in an ASIC. RAM may be embodied in one or more memory chips.
- the memory 304 may be partitioned or otherwise mapped to reflect the boundaries of the various memory subcomponents.
- Memory 304 may include both volatile and persistent memory for the storage of: operational instructions 332 for execution by CPU 102 , data registers, application storage and the like.
- Memory 304 preferably includes a combination of random access memory (RAM), read only memory (ROM) and persistent memory such as that provided by a hard disk drive 318 .
- RAM random access memory
- ROM read only memory
- persistent memory such as that provided by a hard disk drive 318 .
- the computer instructions/applications that are stored in memory 304 are executed by processor 302 .
- the computer instructions/applications 332 and program data 334 can also be stored in hard disk drive 318 for execution by processor device 302 .
- the I/O subsystem 306 may comprise various end user interfaces such as a display, a keyboards, and a mouse.
- the I/O subsystem 306 may further comprise a connection to a network 390 such as a local-area network (LAN) or wide-area network (WAN) such as the Internet.
- LAN local-area network
- WAN wide-area network
- the computer system 300 may also include a removable storage drive 310 , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc.
- the removable storage drive 310 reads from and/or writes to a removable storage unit 320 in a manner well known to those having ordinary skill in the art.
- Removable storage unit 320 represents a floppy disk, a compact disc, magnetic tape, optical disk, CD-ROM, DVD-ROM, etc. which is read by and written to by removable storage drive 310 .
- the removable storage unit 320 includes a non-transitory computer readable medium having stored therein computer software and/or data.
- the computer system 300 may also include a communications interface 312 .
- Communications interface 312 allows software and data to be transferred between the computer system and external devices.
- Examples of communications interface 312 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc.
- Software and data transferred via communications interface 312 are in the form of signals which may be, for example, electronic, electromagnetic, optical, or other signals capable of being received by communications interface 312 .
- computer program medium “computer usable medium,” and “computer readable medium” are used to generally refer to both transitory and non-transitory media such as main memory 304 , removable storage drive 320 , a hard disk installed in hard disk drive 318 , and signals. These computer program products are means for providing software to the computer system 300 .
- the computer readable medium 320 allows the computer system 300 to read data, instructions, messages or message packets, and other computer readable information from the computer readable medium 320 .
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Accounting & Taxation (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Primary Health Care (AREA)
- Human Resources & Organizations (AREA)
- Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Computing Systems (AREA)
- Game Theory and Decision Science (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- None.
- None.
- None.
- The invention disclosed broadly relates to the field of social networks, and more particularly relates to the field of social connections through mobile devices.
- Mobile devices have shown tremendous growth with respect to computers. Recent statistics reveal that in many countries, the number of cell phones in use outnumbers the total population. Most young people use their mobile phones as their primary mode of communication, with voice and text.
- However, current social networking technologies seem to ignore the social patterns among mobile phone users, instead assuming that everyone in a social network has Internet and computer access.
- Briefly, according to an embodiment of the invention a method for expanding a user's social connections to include mobile contacts includes steps or acts of: receiving a user's call logs for call/text transactions from a mobile device; deriving usage information from the call logs to determine social pairs; ranking the social pairs based on strength of connectedness; and merging the ranked social pairs with the user's contacts from on-line social networks.
- According to another embodiment of the present invention, a computer readable storage medium includes program instructions for performing the method steps above.
- According to another embodiment of the present invention, an information processing system includes memory with program instructions stored therein, the program instructions causing a computer to perform: receiving a user's call logs for call/text transactions from a mobile device; deriving usage information from the call logs to determine social pairs; ranking the social pairs based on strength of connectedness; and merging the ranked social pairs with the user's contacts from on-line social networks. The system further includes a processor device operably coupled with the memory for executing the program instructions.
- To describe the foregoing and other exemplary purposes, aspects, and advantages, we use the following detailed description of an exemplary embodiment of the invention with reference to the drawings, in which:
-
FIG. 1 is a simplified illustration of the social mobile network platform, according to an embodiment of the present invention; -
FIG. 2 is a flowchart of a method according to an embodiment of the invention; -
FIG. 3 is a simplified block diagram of a computing system configured to operate according to an embodiment of the present invention; -
FIG. 4 shows a simplified representation of a call/text log for a user for one day; -
FIG. 5 shows a simplified representation of a log with matched number/name pairs, according to an embodiment of the present invention; -
FIG. 6 shows a flowchart of a subprocess from the flowchart ofFIG. 2 , according to an embodiment of the present invention; -
FIG. 7 shows a flowchart of the merge subprocess, according to an embodiment of the present invention; and -
FIG. 8 shows how the social graph, according to an embodiment of the present invention. - While the invention as claimed can be modified into alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the scope of the present invention.
- Before describing in detail embodiments that are in accordance with the present invention, it should be observed that the embodiments reside primarily in combinations of method steps and system components related to systems and methods for placing computation inside a communication network. Accordingly, the system components and method steps have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein. Thus, it will be appreciated that for simplicity and clarity of illustration, common and well-understood elements that are useful or necessary in a commercially feasible embodiment may not be depicted in order to facilitate a less obstructed view of these various embodiments.
- We discuss a social network platform based on mobile telephone communication. The need for this is clear. The social links that people make by phone are not represented in their on-line social networks. The advantage of the mobile social network as will be described herein does not require the user to create new on-line accesses or to maintain an Internet connection. We establish a meaningful social network platform based on a user's mobile usage patterns, such as the calls/texts made to specific numbers and the numbers added by the user, as well as the frequency of the calls/texts and the length of time spent on each call/text. Presumably, the phone contacts with whom the user is communicating on a regular basis are his/her social network as much as, and maybe more than, the user's on-line social network contacts (such as Facebook and Twitter).
- Referring now to the drawings and to
FIG. 1 in particular, we show a simplified illustration of the implementation of the socialmobile network platform 150, according to an embodiment of the present invention. The socialmobile network platform 150 collects usage information for the data and voice calls received and initiated by the user via the user'smobile device 105. This information is available from theservice provider 110 as acall log 120. Theservice provider 110 maintains thelogs 120 of all incoming and outgoing call/text transactions and this information is used by theplatform 150 to derive a mobile social network 160. - The mobile social network 160 assigns a status ranking ranging from most-connected to least-connected social pairs based on: a) the number of transactions; and b) the duration of each transaction. We define a social pair as the “user+x,” with x being either the initiator or the receiver of each call/text. As the history for particular social pairs builds, the originally derived connections become stronger compared to others. Conversely, some social pairs will lose their connected status over a period of time as less contact is made between them. We also assign a higher priority to cell phone transactions initiated by the primary user. Those transactions received by the primary user are accorded a lower priority.
- Once we have defined the social pairs, we aggregate them into groups by category. To define the categories we use parameters such as voice only, data only, (SMS, MMS, etc) or mixed (voice and data). Additionally, we look at temporal parameters, such as time of day (morning, evening); and specific day as for recurring conference calls. The strength of connections will be determined with the parameters including number of transactions, frequency of the transactions, initiated transactions versus received transactions, duration of transactions, and recency of transactions. Then, we merge the new social connections from the mobile social network 160 with the user's existing
social network accounts 180. By uncovering these new social connections 160 based on mobile usage patterns and merging them with othersocial networks 180 we are able to enrich the user's Internet-basedsocial networks 180 and the user's profile. - Referring now to
FIG. 2 , we show aflowchart 200 of the implementation of the mobilesocial network platform 150, according to an embodiment of the present invention. We begin atstep 210 by requesting the user's calllogs 120 for the user's call/text transactions. The telephonenetwork service provider 110 maintains thelogs 120 of all of the user's call/text transactions. Once we are granted access to thecall logs 120, in step 220 we collect the usage information over time in order to derive the social pairs to produce a social graph. Note that we do not consider every call/text transaction from the call logs for inclusion as a social pair. We need to eliminate those transactions that do not meet a pre-determined social threshold. We eliminate: a) calls/text to/from a business/government; b) calls/text that only occur once; and c) calls of a very short duration (probable wrong number). - Then we rank the social pairs by the strength of their “connectedness” in
step 230. We assign a status ranging from most-connected to least-connected social pairs based on: a) the number of transactions; and b) the duration of each transaction. We assign a higher priority to cell phone transactions initiated by the primary user as compared to those transactions received by the primary user. - In
step 240 we aggregate the social pairs into groups by category. We use parameters such as voice only, data only (SMS, MMS, etc) or mixed (voice and data). Additionally, we look at temporal parameters, such as time of day (morning, evening); and specific day as for recurring conference calls.FIG. 5 shows a log with matched social pairs. The strength of connections will be determined with the parameters including number of transactions, frequency of the transactions, initiated transactions versus received transactions, duration of transactions, and recency of transactions. - Then, in
step 250 we merge the new social connections from the mobile social network 160 with the user's existing social network accounts 180. By uncovering these new social connections 160 based on mobile usage and integrating them with the user's profile and with othersocial networks 180 we are able to enrich the user's Internet-basedsocial networks 180. -
FIG. 7 shows the sub-process steps forstep 250. We access the user's social profile instep 710 to be able to view the social contacts the user has designated in his/her on-line social networking sites. Then we access the particularsocial connection sites 180 to which the user belongs (Facebook, Twitter) in step 720. We retrieve our stored mobile call/text contacts (x). If x is already a member of the social connection site, as determined instep 740, we skip the rest of the sub-process steps. If not, the platform sends the connection requests to the mobile call/text contacts (x) through the on-linesocial networks 180 instep 750. We ask them to join the user's social connection site. Instep 760 we add x to the user's social profile. In this way, when a user logs in to his/hersocial network 180 over the Internet, the user's mobile social connections 160 will be included. - Over time, we will need to update the ranking in
step 260. As the history for particular users builds, the originally derived connections become stronger compared to others. Some social pairs will lose their connected status over a period of time as less contact is made between them. The connections need to be pruned constantly to check for recency, activity and current status. - Referring now to
FIG. 6 we show the sub-process steps forstep 210 ofFIG. 2 . First we need to determine the user's service provider instep 610. In order to acquire access to the call logs 120, the users must first opt in for the mobile social groups service and provide a release. Instep 620 we verify that the user has provided permission to contact his/herservice provider 110. Since agreements of this nature tend to have temporal limits, we must monitor expiration dates and renew accordingly. Once accepted into the service, ourplatform 150 will work directly with the user'sservice provider 110 to obtain the user translations (call logs 120) instep 630. Instep 640 we store the call logs 120. Now we havecall logs 120 which provide telephone numbers, but no names. SeeFIG. 4 for an exemplary representation of acall log 120 for a user representing calls/texts made/received in one day. - We need to match the phone numbers from the call logs 120 with their names. In order to accomplish this, we sync with the user's
mobile device 105 where the user has stored his/her phone contacts with name and contact details instep 650. Instep 660 we match the phone numbers from the call logs 120 to the contact names from the user'smobile device 105 instep 660. We add the names and details to the social graph we maintain in ourplatform 150. -
FIG. 8 shows an exemplarysocial graph 800. Here you can see that calls/texts pertaining to businesses/government and calls/texts of a very short duration have been eliminated. We assigned a ranking based on frequency, recency, duration, and origin of the calls/texts. Based on this ranking, we determined the “most-connected”social pairs, and here the top four are shown. From this grouping of “most-connected” we implemented the sub-process shown inFIG. 6 to derive the contact names (shown grayed out) from the user'smobile device 105. Then, with the contact names we implemented the sub-process ofFIG. 7 to merge these “most-connected” social pairings with the user's social networking contacts fromsocial networking sites 180. Here we show that Susan E., S. Jobs, and M. Hamilton are already “friends” on thesite 180, so we send a connection request to Gus Hailey only. -
FIG. 3 System Embodiment. - Referring now to
FIG. 3 , there is provided a simplified pictorial illustration of aninformation processing system 300 for the socialmobile network platform 150 in which the present invention may be implemented. The exemplary embodiment is only one example of suitable components and is not intended to suggest any limitation as to the scope of use or functionality of the invention. For purposes of this invention,computer system 300 may represent any type of computer, information processing system or other programmable electronic device, including a client computer, a server computer, a portable computer, an embedded controller, a personal digital assistant, and so on. Thecomputer system 300 may be a stand-alone device or networked into a larger system.Computer system 300, illustrated for exemplary purposes as a networked computing device, is in communication with other networked computing devices (not shown) vianetwork 310. As will be appreciated by those of ordinary skill in the art,network 310 may be embodied using conventional networking technologies and may include one or more of the following: local area networks, wide area networks, intranets, public Internet and the like. - Throughout the description herein, an embodiment of the invention is illustrated with aspects of the invention embodied solely on
computer system 300. As will be appreciated by those of ordinary skill in the art, aspects of the invention may be distributed amongst one or more networked computing devices which interact withcomputer system 300 via one or more data networks such as, for example,network 310. However, for ease of understanding, aspects of the invention have been embodied in a single computing device—computer system 300. -
Computer system 300 includes inter aliaprocessing device 302 which communicates with an input/output subsystem 306,memory 304,storage 310 andnetwork 310. Theprocessor device 302 is operably coupled with a communication infrastructure 322 (e.g., a communications bus, cross-over bar, or network). Theprocessor device 302 may be a general or special purpose microprocessor operating under control of computer program instructions executed frommemory 304 onprogram data 334. Theprogram data 334 includes the objects and their metadata. Program instructions for generating the mobile social pairs and merging them with social networks may be stored in 332. Theprocessor 302 may include a number of special purpose sub-processors such as a comparator engine, each sub-processor for executing particular portions of the computer program instructions. Each sub-processor may be a separate circuit able to operate substantially in parallel with the other sub-processors. - Some or all of the sub-processors may be implemented as computer program processes (software) tangibly stored in a memory that perform their respective functions when executed. These may share an instruction processor, such as a general purpose integrated circuit microprocessor, or each sub-processor may have its own processor for executing instructions. Alternatively, some or all of the sub-processors may be implemented in an ASIC. RAM may be embodied in one or more memory chips.
- The
memory 304 may be partitioned or otherwise mapped to reflect the boundaries of the various memory subcomponents.Memory 304 may include both volatile and persistent memory for the storage of:operational instructions 332 for execution by CPU 102, data registers, application storage and the like.Memory 304 preferably includes a combination of random access memory (RAM), read only memory (ROM) and persistent memory such as that provided by ahard disk drive 318. The computer instructions/applications that are stored inmemory 304 are executed byprocessor 302. The computer instructions/applications 332 andprogram data 334 can also be stored inhard disk drive 318 for execution byprocessor device 302. - The I/
O subsystem 306 may comprise various end user interfaces such as a display, a keyboards, and a mouse. The I/O subsystem 306 may further comprise a connection to anetwork 390 such as a local-area network (LAN) or wide-area network (WAN) such as the Internet. - The
computer system 300 may also include aremovable storage drive 310, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc. Theremovable storage drive 310 reads from and/or writes to aremovable storage unit 320 in a manner well known to those having ordinary skill in the art.Removable storage unit 320, represents a floppy disk, a compact disc, magnetic tape, optical disk, CD-ROM, DVD-ROM, etc. which is read by and written to byremovable storage drive 310. As will be appreciated, theremovable storage unit 320 includes a non-transitory computer readable medium having stored therein computer software and/or data. - The
computer system 300 may also include acommunications interface 312. Communications interface 312 allows software and data to be transferred between the computer system and external devices. Examples ofcommunications interface 312 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred viacommunications interface 312 are in the form of signals which may be, for example, electronic, electromagnetic, optical, or other signals capable of being received bycommunications interface 312. - In this document, the terms “computer program medium,” “computer usable medium,” and “computer readable medium” are used to generally refer to both transitory and non-transitory media such as
main memory 304,removable storage drive 320, a hard disk installed inhard disk drive 318, and signals. These computer program products are means for providing software to thecomputer system 300. The computerreadable medium 320 allows thecomputer system 300 to read data, instructions, messages or message packets, and other computer readable information from the computerreadable medium 320. - Benefits and Advantages of the Invention.
- We are able to bring new users to the social graph by connecting the mobile users with the user's already existing social networks. This can be applied to mobiles without internet connectivity as well as the smart phones to uncover new links based on activity/transactions. In addition, we are able to use the social pair ranking and categories to target advertisements based on the strength of the call/text connections, time of day, and what the network as a whole is doing. Uncovering new connections from random phone calls. Collaboration of offline and online social networks. Targeted Ads based on strength of connections and recency, group activity. Cross pollination of Ads on and off network.
- Therefore, while there has been described what is presently considered to be the preferred embodiment, it will understood by those skilled in the art that other modifications can be made within the spirit of the invention. The above description(s) of embodiment(s) is not intended to be exhaustive or limiting in scope. The embodiment(s), as described, were chosen in order to explain the principles of the invention, show its practical application, and enable those with ordinary skill in the art to understand how to make and use the invention. It should be understood that the invention is not limited to the embodiment(s) described above, but rather should be interpreted within the full meaning and scope of the appended claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/303,639 US20130132395A1 (en) | 2011-11-23 | 2011-11-23 | Mobile social groups |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/303,639 US20130132395A1 (en) | 2011-11-23 | 2011-11-23 | Mobile social groups |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130132395A1 true US20130132395A1 (en) | 2013-05-23 |
Family
ID=48427939
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/303,639 Abandoned US20130132395A1 (en) | 2011-11-23 | 2011-11-23 | Mobile social groups |
Country Status (1)
Country | Link |
---|---|
US (1) | US20130132395A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140074925A1 (en) * | 2012-09-13 | 2014-03-13 | Comcast Cable Communications, Llc | Social Network Mapping |
US20220329663A1 (en) * | 2021-04-12 | 2022-10-13 | Rakuten Mobile, Inc. | Managing a software application |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5864613A (en) * | 1996-09-16 | 1999-01-26 | Mci Communications Corporation | System and method for controlling telephone use |
US20070183339A1 (en) * | 2005-02-18 | 2007-08-09 | Rousell Graham P | System and method of producing statistical information about call durations |
US20100039495A1 (en) * | 2008-08-12 | 2010-02-18 | Polycom, Inc. | Method to populate contact list from recent call log |
-
2011
- 2011-11-23 US US13/303,639 patent/US20130132395A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5864613A (en) * | 1996-09-16 | 1999-01-26 | Mci Communications Corporation | System and method for controlling telephone use |
US20070183339A1 (en) * | 2005-02-18 | 2007-08-09 | Rousell Graham P | System and method of producing statistical information about call durations |
US20100039495A1 (en) * | 2008-08-12 | 2010-02-18 | Polycom, Inc. | Method to populate contact list from recent call log |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140074925A1 (en) * | 2012-09-13 | 2014-03-13 | Comcast Cable Communications, Llc | Social Network Mapping |
US9245300B2 (en) * | 2012-09-13 | 2016-01-26 | Comcast Cable Communications, Llc | Social network mapping |
US20220329663A1 (en) * | 2021-04-12 | 2022-10-13 | Rakuten Mobile, Inc. | Managing a software application |
US11736578B2 (en) * | 2021-04-12 | 2023-08-22 | Rakuten Mobile, Inc. | Managing a software application |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9147008B2 (en) | Activity based recommendations within a social networking environment based upon graph activation | |
US9015597B2 (en) | Generation and implementation of a social utility grid | |
US8789133B2 (en) | Location based content filtering and dynamic policy | |
US11537588B2 (en) | Systems and methods for providing a two-way, intelligent text messaging platform | |
US20150271653A1 (en) | Method of Sending Messages to Devices Not Configured to Receive Them | |
CN112311841B (en) | Information pushing method and device, electronic equipment and computer readable medium | |
US20110035451A1 (en) | Systems and Methods for Spam Filtering | |
US20150215261A1 (en) | Methods and devices for online contacts expansion | |
KR20140100989A (en) | Anonymous friend-making method, system, network server and storage medium | |
JP6235064B2 (en) | Establishment of social network service relationship | |
US12002113B2 (en) | Method, apparatus, and computer-readable medium for leveraging data | |
CN103124254A (en) | Method, server and device establishing directional push | |
EP3105891A1 (en) | Instant messaging with non subscriber users | |
US9832787B2 (en) | Attention management | |
US9210117B2 (en) | Invitation information push method and system | |
US10194010B1 (en) | Techniques to manage contact records | |
CN108924032B (en) | Electronic resource distribution method, medium, device and computing equipment based on instant messaging behavior data | |
JP2016045927A (en) | User authentication method and user authentication system for service account, and storage medium | |
US20130132395A1 (en) | Mobile social groups | |
US9241015B1 (en) | System and method for suggesting discussion topics in a social network | |
Lakkireddy et al. | Web-based application for real-time chatting using firebase | |
Nurse | Exploring the risks to identity security and privacy in cyberspace | |
CN111770011B (en) | Risk prompting method and device, electronic equipment and computer readable storage medium | |
US11665278B2 (en) | Contextual call handling mechanism with learned relationship filter | |
KR20100137756A (en) | Method and apparatus for providing group address book service in communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: YAHOO| INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GUPTA, ARPIT;REEL/FRAME:027273/0704 Effective date: 20111121 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: YAHOO HOLDINGS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO| INC.;REEL/FRAME:042963/0211 Effective date: 20170613 |
|
AS | Assignment |
Owner name: OATH INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO HOLDINGS, INC.;REEL/FRAME:045240/0310 Effective date: 20171231 |